US9722971B2 - Method for routing within a mobile terminal emulating a contactless payment card - Google Patents

Method for routing within a mobile terminal emulating a contactless payment card Download PDF

Info

Publication number
US9722971B2
US9722971B2 US14/366,807 US201214366807A US9722971B2 US 9722971 B2 US9722971 B2 US 9722971B2 US 201214366807 A US201214366807 A US 201214366807A US 9722971 B2 US9722971 B2 US 9722971B2
Authority
US
United States
Prior art keywords
application
secure element
list
applications
secure
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Fee Related
Application number
US14/366,807
Other languages
English (en)
Other versions
US20150020160A1 (en
Inventor
Louis-Philippe Goncalves
Sebastien Poly
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Idemia Identity and Security France SAS
Original Assignee
Morpho SA
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Morpho SA filed Critical Morpho SA
Assigned to MORPHO reassignment MORPHO ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: POLY, SEBASTIEN, GONCALVES, LOUIS-PHILIPPE
Publication of US20150020160A1 publication Critical patent/US20150020160A1/en
Application granted granted Critical
Publication of US9722971B2 publication Critical patent/US9722971B2/en
Assigned to IDEMIA IDENTITY & SECURITY FRANCE reassignment IDEMIA IDENTITY & SECURITY FRANCE CHANGE OF NAME (SEE DOCUMENT FOR DETAILS). Assignors: MORPHO
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/52Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow
    • G06F21/53Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow by executing in a restricted environment, e.g. sandbox or secure virtual machine
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/30Payment architectures, schemes or protocols characterised by the use of specific devices or networks
    • G06Q20/32Payment architectures, schemes or protocols characterised by the use of specific devices or networks using wireless devices
    • G06Q20/322Aspects of commerce using mobile devices [M-devices]
    • G06Q20/3226Use of secure elements separate from M-devices
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/30Payment architectures, schemes or protocols characterised by the use of specific devices or networks
    • G06Q20/32Payment architectures, schemes or protocols characterised by the use of specific devices or networks using wireless devices
    • G06Q20/322Aspects of commerce using mobile devices [M-devices]
    • G06Q20/3227Aspects of commerce using mobile devices [M-devices] using secure elements embedded in M-devices
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/30Payment architectures, schemes or protocols characterised by the use of specific devices or networks
    • G06Q20/32Payment architectures, schemes or protocols characterised by the use of specific devices or networks using wireless devices
    • G06Q20/322Aspects of commerce using mobile devices [M-devices]
    • G06Q20/3229Use of the SIM of a M-device as secure element
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/30Payment architectures, schemes or protocols characterised by the use of specific devices or networks
    • G06Q20/32Payment architectures, schemes or protocols characterised by the use of specific devices or networks using wireless devices
    • G06Q20/327Short range or proximity payments by means of M-devices
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/30Payment architectures, schemes or protocols characterised by the use of specific devices or networks
    • G06Q20/32Payment architectures, schemes or protocols characterised by the use of specific devices or networks using wireless devices
    • G06Q20/327Short range or proximity payments by means of M-devices
    • G06Q20/3278RFID or NFC payments by means of M-devices
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/30Payment architectures, schemes or protocols characterised by the use of specific devices or networks
    • G06Q20/34Payment architectures, schemes or protocols characterised by the use of specific devices or networks using cards, e.g. integrated circuit [IC] cards or magnetic cards
    • G06Q20/351Virtual cards
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/30Payment architectures, schemes or protocols characterised by the use of specific devices or networks
    • G06Q20/34Payment architectures, schemes or protocols characterised by the use of specific devices or networks using cards, e.g. integrated circuit [IC] cards or magnetic cards
    • G06Q20/352Contactless payments by cards
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/30Payment architectures, schemes or protocols characterised by the use of specific devices or networks
    • G06Q20/34Payment architectures, schemes or protocols characterised by the use of specific devices or networks using cards, e.g. integrated circuit [IC] cards or magnetic cards
    • G06Q20/356Aspects of software for card payments
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/30Payment architectures, schemes or protocols characterised by the use of specific devices or networks
    • G06Q20/34Payment architectures, schemes or protocols characterised by the use of specific devices or networks using cards, e.g. integrated circuit [IC] cards or magnetic cards
    • G06Q20/357Cards having a plurality of specified features
    • G06Q20/3574Multiple applications on card
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/30Payment architectures, schemes or protocols characterised by the use of specific devices or networks
    • G06Q20/32Payment architectures, schemes or protocols characterised by the use of specific devices or networks using wireless devices

Definitions

  • the present invention concerns the field of the emulation of contactless payment cards and more particularly the routing of contactless communication within a device comprising several contactless payment card emulation circuits.
  • Bank cards that can be used for payment in shops are composed of a chip card component hosting the bank applications. This component has a high level of security and for this reason is called a secure element or SE.
  • connection is established then between the payment terminal and the SE in order to make the payment.
  • the connection is a physical connection using the physical connectors of the SE.
  • Contactless payment is developing. It is based on the use at the time of payment of a so-called contactless payment card that typically combines firstly the SE of a conventional payment card and a near field communication (NFC) label. The payment terminal is then equipped with an NFC label reader. The function is then the same as for a conventional payment card, the physical connection being replaced by the near field radio connection of the NFC type.
  • NFC near field communication
  • the secure element may be implemented within the subscriber card or SIM (Subscriber Identity Module) card in case the mobile terminal is a mobile telephone, or a secure SIM card. It may also be implemented in the form of a component of the mother board of the mobile terminal, or within an additional board, for example an SD (Secure Digital) board. It could also be a case of a payment card, for example connected suitably to the terminal. Any one terminal may even comprise several different secure elements able to communicate with a payment terminal through the near-field radio interface.
  • SIM Subscriber Identity Module
  • SD Secure Digital
  • the invention aims to solve the above problems by means of a method for routing messages within the NFC controller.
  • This controller has a table of the various applications hosted by the various secure elements.
  • the controller receives a request for the list of applications contained in the virtual payment card, it intercepts this request and responds with the list of the various applications accessible on the various secure elements.
  • the controller stores the secure element concerned and reroutes all the messages to this element as long as it does not receive a new selection request.
  • the invention concerns a method for routing within a mobile terminal emulating a contactless payment card and comprising a plurality of secure elements that can dialogue with a near field radio communication component, comprising the following steps: a step of reception by the radio communication component of a message coming from a payment terminal and which further comprises, if the command received is a selection command intended to receive the list of available applications: a step of forming said list from a stored table, said list containing all or some of the applications available in all the secure elements; a step of sending said list to the payment terminal in response to the selection command received and which further comprises, if the command received is an application selection command: a step of consulting said stored table in order to identify the secure element hosting the selected application; a step of storing the secure element identified as an active secure element; a step of relaying said application selection command to the active secure element and which further comprises, for all the other commands received, a step of relaying said received command to the active secure element.
  • said stored table comprising, for each application, an application identifier termed public in addition to its application identifier within the secure element, this then being termed a real identifier
  • the step of forming said list of applications forms said list from the public identifiers rather than from the real identifiers of the applications
  • the step of relaying the command to the secure element for its part comprises a step of replacing the public identifier with the real identifier of the application prior to the relaying of the command to the active secure element.
  • it further comprises a step of updating said stored table when a change occurs in the architecture of the secure elements of the mobile terminal.
  • said updating step is performed under the control of an updating module executed on the central processor of said terminal.
  • it further comprises a step of managing the rights of access to said table by said updating module.
  • the invention also concerns a mobile terminal emulating a contactless payment card and comprising a plurality of secure elements able to dialogue with a near field radio communication component, comprising means for the reception, by the radio communication component, of a message coming from a payment terminal and which further comprises, if the command received is a selection command intended to receive the list of available applications: means for forming said list from a stored table, said list containing all or some of the applications available in all the secure elements; means for sending said list to the payment terminal in response to the selection command received and which further comprises, if the command received is an application selection command: means for consulting said stored table in order to identify the secure element hosting the selected application; means for storing the secure element identified as an active secure element; means for relaying said application selection command to the active secure element and which further comprises, for all the other commands received, means for relaying said received command to the active secure element.
  • FIG. 1 illustrates the general architecture of a mobile terminal equipped with several secure elements.
  • FIG. 2 details this architecture in an example embodiment of the invention.
  • FIG. 3 illustrates the exchanges between the various components of the system during an application selection.
  • FIG. 4 illustrates the operating flow diagram of the routing module within the NFC controller in an example embodiment of the invention.
  • Mobile terminal means in the present text any type of information processing device that can be carried by a user and that is able to host a near field radio communication interface of the NFC type. According to the herein described example of embodiment, such a terminal is a mobile telephony terminal, but it may also be a personal digital assistant, a portable computer or other.
  • the architecture of this device is illustrated in FIG. 1 .
  • the terminal 1 . 1 has a main processor 1 . 3 that enables the operating system of the terminal to function.
  • a secure element is defined as a component consisting of a computing memory unit.
  • These secure elements are designed to be able to host, in a secure manner, various applications including typically banking applications. These banking applications are intended, among other things, to enable the user of the terminal to make payments by means of his terminal.
  • the secure elements also host a cryptographic processing unit used for the contents signature, ciphering and deciphering algorithms by means of digital certificates. They host the certificates enabling the user to authenticate with banking services, etc.
  • the functioning of these secure elements is standardised and can be consulted under the reference ISO 7816.
  • a secure element may be implemented within the subscriber card or SIM (Subscriber Identity Module) card in the case where the terminal 1 . 1 is a mobile telephone, or a secure SIM card. It may also be implemented in the form of a component of the mother board of the terminal 1 . 1 , or within an additional board, for example an SD (Secure Digital) board. It may also be a payment card suitably connected to the terminal 1 . 1 .
  • the terminal 1 . 1 may even comprise several different secure elements able to communicate with a payment terminal through a near field radio interface.
  • FIG. 1 three secure elements 1 . 5 , 1 . 6 and 1 . 7 are connected to the central processor 1 . 3 , for example via a serial link.
  • the central processor 1 . 3 can therefore interact with these secure elements 1 . 5 , 1 . 6 and 1 . 7 , and send them commands and receive the responses.
  • an NFC near field radio communication component 1 . 4 may also communicate with the central processor 1 . 3 by means of a bus.
  • the NFC component is controlled by an application functioning on this central processor 1 . 3 .
  • the problem addressed by the present invention is to allow routing of communications between the NFC component 1 . 4 and the various secure elements, in the present case, by way of example, the secure elements 1 . 5 , 1 . 6 and 1 . 7 .
  • FIG. 2 illustrates in more detail the architecture of an example embodiment.
  • the NFC component 2 . 3 is again present, which affords communication with a payment terminal 2 . 5 .
  • the NFC component can communicate with a plurality 2 . 6 , 2 . 8 and 2 . 10 of secure elements.
  • the apparatus always functions under the control of an operating system running on the processor 2 . 1 .
  • FIG. 2 also shows the various applications 2 . 7 , 2 . 9 and 2 . 11 hosted by each of the secure elements 2 . 6 , 2 . 8 and 2 . 10 .
  • the invention is essentially implemented within the NFC component 2 . 3 in the form of a routing module 2 . 4 .
  • a module 2 . 2 for managing a table of the available applications can be used. This module then functions on the central processor 2 . 1 of the mobile terminal 1 . 1 . Its function will be detailed later.
  • FIG. 3 illustrates the exchanges between the various components of the system during an application selection.
  • the conventional function of a contactless payment card is as follows. When the card enters into the field of a reader equipping a payment terminal, low-level protocol exchanges take place in order to initialise the connection. These exchanges are not described in detail here.
  • the payment terminal sends a first selection command called “SELECT PPSE”, the purpose of which is to request, from the card, the list of applications present within it.
  • the card responds to this request by means of a list of available applications and, for each application, gives an application identifier known by the term AID (Application IDentifier).
  • the terminal chooses one of these applications in the list and selects it by means of a command “SELECT AID”. All the following exchanges then take place between the terminal and the application selected as long as a new selection command is not sent by the payment terminal.
  • the payment terminal is represented by the line 3 . 1 in FIG. 3 .
  • the line 3 . 2 represents the NFC component of the mobile terminal, while the lines 3 . 31 , 3 . 32 and 3 . 33 represent the various secure elements hosted in the mobile terminal.
  • the terminal sends a command “SELECT PPSE” 3 . 4 aimed at requesting the list of available banking applications
  • this request is received firstly by the NFC component 2 . 3 .
  • This request is then filtered and recognised as such by an ad hoc module, referred to as a routing module and referenced 2 . 4 in FIG. 2 .
  • the first innovative aspect of the invention consists of this interception and of the fact that the routing module intercepts the command “SELECT PPSE” in order to respond thereto instead of one of the secure elements.
  • the routing module therefore responds to the request by sending 3 . 5 a table of the applications available on all the secure elements.
  • This table may be formed in various ways. It may be configured at the time of initialisation of the terminal or fixed by the operator or by the bank of which the user is a customer. Any means for forming the table is permissible. There may also be an initial step where the routing module itself sends a command “SELECT PPSE” to each of the secure elements, receives the responses sent by each of the secure elements and then itself forms a table resulting from a concatenation of the lists received in response. According to some embodiments, the table stored in the routing module and sent in response to the command “SELECT PPSE” sent by the payment terminal may not contain all the applications available on the various secure elements.
  • the table therefore contains a subset containing all or some of the set of applications available on all the secure elements.
  • the table may also be stored by the routing module within any storage space available in the terminal and the location thereof is not limited to the NFC component itself.
  • the table also contains, for each application, an identifier of the secure element that hosts it. In this way, when the routing module receives the command 3 . 6 “SELECT AID”, it can find the secure element that hosts the selected application. It then stores the secure element as being the active secure element during step 3 . 7 .
  • the routing module functions according to the flow diagram in FIG. 4 .
  • the module receives a command sent by the payment terminal via the NFC connection. This command is then filtered and processed according to its nature. Three cases can be distinguished.
  • the command received is a command “SELECT PPSE” intended to obtain the list of applications available within the contactless payment card emulated by the mobile terminal.
  • Step 4 . 2 of forming the list of applications from the stored table is then passed to, this list containing all or some of the applications available in all the secure elements. Once this list is constructed, it is sent, in response to the command “SELECT PPSE”, to the payment terminal during a step 4 . 3 .
  • the command received is a command “SELECT AID”.
  • the routing module consults the stored table in order to find the secure element that is hosting the application, the identifier of which is made a parameter of the selection command. Once this secure element is identified, the routing module stores this new secure element as the current active secure element, during step 4 . 5 . The selection command is then relayed to the active secure element during step 4 . 6 . In this way firstly the identity is stored of the secure element to which the received selection command and therefore the following commands relate, and secondly this command is transmitted for effective selection of the required application within the secure element.
  • step 4 . 7 Any other command is treated in accordance with step 4 . 7 , which merely relays the command to the active secure element.
  • an active secure element is stored by default when the terminal is switched on.
  • the stored table associates with each application an identifier, termed the public identifier, which may be different from the real identifier of the application in the secure element.
  • the step of forming the list of applications 4 . 2 forms said list from the public identifiers rather than from the real identifiers of the applications.
  • the step 4 . 6 of relaying the command to the secure element for its part comprises a step of replacing the public identifier with the real identifier of the application prior to the relaying of the command to the active secure element. In this way, it is possible to disclose applications having the same identifier hosted in two different secure elements.
  • the table is updated when a modification occurs in the architecture of the secure elements of the mobile terminal, for example when a new SIM card or a new SD card containing a secure element is inserted.
  • the updating is then controlled by a module for updating the table, the module 2 . 2 being executed on the processor of the terminal.
  • this table is protected by means of access rights.
  • the operator or the bank may modify the table. Access to a given application or even to a given secure element can then be dependent on commercial considerations and not be automatic.
  • the access rights are then advantageously managed by said module for updating the table.

Landscapes

  • Engineering & Computer Science (AREA)
  • Business, Economics & Management (AREA)
  • Theoretical Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Physics & Mathematics (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • General Business, Economics & Management (AREA)
  • Accounting & Taxation (AREA)
  • Strategic Management (AREA)
  • Microelectronics & Electronic Packaging (AREA)
  • Computer Security & Cryptography (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Signal Processing (AREA)
  • Computing Systems (AREA)
  • Mobile Radio Communication Systems (AREA)
  • Telephone Function (AREA)
  • Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)
US14/366,807 2011-12-21 2012-12-20 Method for routing within a mobile terminal emulating a contactless payment card Expired - Fee Related US9722971B2 (en)

Applications Claiming Priority (4)

Application Number Priority Date Filing Date Title
FR1162120 2011-12-21
FR1162120A FR2985063B1 (fr) 2011-12-21 2011-12-21 Procede de routage au sein d'un terminal mobile emulant une carte de paiement sans contact
FR11/62120 2011-12-21
PCT/EP2012/076280 WO2013092796A1 (fr) 2011-12-21 2012-12-20 Procédé de routage au sein d'un terminal mobile émulant une carte de paiement sans contact

Publications (2)

Publication Number Publication Date
US20150020160A1 US20150020160A1 (en) 2015-01-15
US9722971B2 true US9722971B2 (en) 2017-08-01

Family

ID=47557075

Family Applications (1)

Application Number Title Priority Date Filing Date
US14/366,807 Expired - Fee Related US9722971B2 (en) 2011-12-21 2012-12-20 Method for routing within a mobile terminal emulating a contactless payment card

Country Status (10)

Country Link
US (1) US9722971B2 (fr)
EP (1) EP2795551B1 (fr)
JP (1) JP6193879B2 (fr)
KR (1) KR20140103153A (fr)
CN (1) CN104115173B (fr)
BR (1) BR112014015273B1 (fr)
FR (1) FR2985063B1 (fr)
MY (1) MY168780A (fr)
RU (1) RU2611241C2 (fr)
WO (1) WO2013092796A1 (fr)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20170185995A1 (en) * 2014-04-18 2017-06-29 Ingenico Group Module for emulating at least one payment card, corresponding method, payment device, computer program product and storage medium
US11429955B2 (en) 2015-12-18 2022-08-30 Orange Method for securing a transaction from a mobile terminal

Families Citing this family (21)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9337899B2 (en) * 2012-02-13 2016-05-10 Qualcomm Incorporated Methods and apparatus for secure updates to persistent data in a near field communication controller
KR20140140079A (ko) * 2012-04-18 2014-12-08 구글 인코포레이티드 보안 요소를 갖지 않는 지불 거래들의 처리
US10142232B2 (en) * 2014-06-03 2018-11-27 Huawei Technologies Co., Ltd. Route setting method and terminal device
US10242356B2 (en) * 2014-08-25 2019-03-26 Google Llc Host-formatted select proximity payment system environment response
CN105682074B (zh) * 2014-11-20 2018-12-28 中国移动通信集团公司 一种基于hce应用的应用标识aid的更新方法及装置
WO2016129863A1 (fr) 2015-02-12 2016-08-18 Samsung Electronics Co., Ltd. Procédé de traitement de paiement et dispositif électronique prenant en charge ledit procédé
US10103781B2 (en) 2015-02-20 2018-10-16 Visa International Service Association Contactless data exchange between mobile devices and readers involving value information not necessary to perform a transaction
KR102460459B1 (ko) 2015-02-27 2022-10-28 삼성전자주식회사 전자 장치를 이용한 카드 서비스 방법 및 장치
US11107047B2 (en) 2015-02-27 2021-08-31 Samsung Electronics Co., Ltd. Electronic device providing electronic payment function and operating method thereof
US10193700B2 (en) 2015-02-27 2019-01-29 Samsung Electronics Co., Ltd. Trust-zone-based end-to-end security
FR3040226B1 (fr) * 2015-08-17 2018-06-08 Stmicroelectronics (Rousset) Sas Dispositif nfc muni de multiples elements securise
WO2017128182A1 (fr) * 2016-01-28 2017-08-03 华为技术有限公司 Procédé et terminal de paiement de communication en champ proche
US10949530B2 (en) * 2016-03-30 2021-03-16 Huawei Technologies Co., Ltd. Transaction method, transaction information processing method, transaction terminal, and server
EP3236405B1 (fr) * 2016-04-21 2022-11-02 IDEMIA France Selection d'une application sur une carte
KR102648142B1 (ko) * 2016-09-09 2024-03-18 삼성전자주식회사 결제 서비스를 제공하는 전자 장치 및 방법
FR3087307A1 (fr) * 2018-10-15 2020-04-17 Proton World International N.V. Gestion de transactions dans un dispositif nfc
FR3094517A1 (fr) 2019-03-25 2020-10-02 Proton World International N.V. Système électronique
FR3094514A1 (fr) 2019-03-25 2020-10-02 Proton World International N.V. Système électronique
FR3094516A1 (fr) * 2019-03-25 2020-10-02 Proton World International N.V. Système électronique
CN111107525B (zh) * 2019-04-26 2022-01-14 华为技术有限公司 一种se的自动路由方法及电子设备
CN110381443B (zh) * 2019-09-05 2022-04-22 北京小米移动软件有限公司 近场通信卡片激活方法和装置

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20070278290A1 (en) * 2006-06-06 2007-12-06 Messerges Thomas S User-configurable priority list for mobile device electronic payment applications
US20100190437A1 (en) * 2009-01-26 2010-07-29 Motorola, Inc. Wireless Communication Device for Providing at Least One Near Field Communication Service
US20110143663A1 (en) 2009-12-11 2011-06-16 Toro Development Limited Mobile integrated distribution and transaction system and method for nfc services, and a mobile electronic device thereof
US8249654B1 (en) * 2007-09-27 2012-08-21 Sprint Communications Company L.P. Dynamic smart card application loading

Family Cites Families (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP4780434B2 (ja) * 2001-08-03 2011-09-28 大日本印刷株式会社 マルチアプリケーションicカードシステム
CN101454794A (zh) * 2006-03-30 2009-06-10 奥博佩公司 移动的个人之间支付系统
FR2913550A1 (fr) * 2007-03-07 2008-09-12 Inside Contactless Sa Procede de chargement securise de donnees d'acces a un service dans un chipset nfc
JP2009294821A (ja) * 2008-06-04 2009-12-17 Sony Corp 情報処理装置、情報処理方法、およびプログラム、並びに情報処理システム
JP5290119B2 (ja) * 2009-10-16 2013-09-18 株式会社エヌ・ティ・ティ・ドコモ サービス提供システム及びサービス提供方法
JP2011215833A (ja) * 2010-03-31 2011-10-27 Toshiba Corp 携帯可能電子装置及びicカード
EP2393261A1 (fr) * 2010-06-04 2011-12-07 Gemalto SA Dispositif portable, système et procédé pour empêcher l'utilisation abusive de données issues d'un dispositif portable
JP5429130B2 (ja) * 2010-10-13 2014-02-26 ソニー株式会社 情報処理装置、および情報処理方法

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20070278290A1 (en) * 2006-06-06 2007-12-06 Messerges Thomas S User-configurable priority list for mobile device electronic payment applications
US8249654B1 (en) * 2007-09-27 2012-08-21 Sprint Communications Company L.P. Dynamic smart card application loading
US20100190437A1 (en) * 2009-01-26 2010-07-29 Motorola, Inc. Wireless Communication Device for Providing at Least One Near Field Communication Service
US20110143663A1 (en) 2009-12-11 2011-06-16 Toro Development Limited Mobile integrated distribution and transaction system and method for nfc services, and a mobile electronic device thereof

Non-Patent Citations (9)

* Cited by examiner, † Cited by third party
Title
Gerald Madlmayr et al.: "Management of Multiple Cards in NFC-Devices", Sep. 8, 2008, Smart Card Research and Advanced Applications; [lecture notes in computer science] Springer Berlin Heidelberg, Berlin, Heidelberg, pp. 149-161, XP019104509. ISBN: 978-3-540-85892-8.
GERALD MADLMAYR: "Management of Multiple Secure Elements in NFC-Devices", CARDIS 2008, ROYAL HOLLOWAY UNIVERSITY OF LONDON, 1 January 2008 (2008-01-01), XP055024802, Retrieved from the Internet <URL:http://www.nfc-research.at/fileadmin/papers/2008/09/2008_09_11_Cardis.pdf> [retrieved on 20120418]
Gerald Madlmayr: "Management of Multiple Secure Elements in NFC-Devices"; Cardis 2008. Royal Holloway University of London, Jan. 1, 2008, XP055024802, pp. 7-13. URL: http://www.nfc-research.at/fileadmin/papers/2008/09/2008-09-11-cardis.pdf.
GSMA: "Mobile NFC technical guidelines", pages 1 - 95, XP002558746, Retrieved from the Internet <URL:http://www.gsmworld.com/documents/gsma_nfc2_wp.pdf> [retrieved on 20100114]
GSMA: Mobile NFC Technical Guidelines, Internet Citation, Dec. 2007, pp. 1-95, XP002558746, URL: http://www.gsmworld.com/documents/gsmanfc2-wp.pdf.
MARIE REVEILHAC ; MARC PASQUET: "Promising Secure Element Alternatives for NFC Technology", PROCEEDINGS 2009 FIRST INTERNATIONAL WORKSHOP ON NEAR FIELD COMMUNICATION - NFC '09, IEEE, PISCATAWAY, NJ, USA, 24 February 2009 (2009-02-24), Piscataway, NJ, USA, pages 75 - 80, XP031500082, ISBN: 978-0-7695-3577-7
Marie Reveilhac et al.: "Promising Secure Element Alternatives for NFC Technology"; Proceedings 2009 First International Workshop on Near Field Communication-NFC 09, IEEE, Piscataway, NJ, USA, Feb. 24, 2009, pp. 75-80, XP031500082, ISBN: 978-0-7695-3577-7.
NPL—PCT—WO 2009/156880, published by World Intellectual Property Organization, 23 pagesCorda et al., Method of Accessing Application in a secure mobile environment, May 19, 2009, published by World Intellectual Property Organization, 23 pages. *
WALTER DIDIMO;MAURIZIO PATRIGNANI: "Network and Parallel Computing", vol. 5189, 8 September 2008, SPRINGER INTERNATIONAL PUBLISHING, Cham, ISBN: 978-3-540-76785-5, ISSN: 0302-9743, article GERALD MADLMAYR; OLIVER DILLINGER; JOSEF LANGER; JOSEF SCHARINGER;: "Management of Multiple Cards in NFC-Devices", pages: 149 - 161, XP019104509, 032548

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20170185995A1 (en) * 2014-04-18 2017-06-29 Ingenico Group Module for emulating at least one payment card, corresponding method, payment device, computer program product and storage medium
US11429955B2 (en) 2015-12-18 2022-08-30 Orange Method for securing a transaction from a mobile terminal

Also Published As

Publication number Publication date
BR112014015273B1 (pt) 2021-02-02
WO2013092796A1 (fr) 2013-06-27
CN104115173B (zh) 2018-03-27
MY168780A (en) 2018-12-04
EP2795551B1 (fr) 2016-03-09
CN104115173A (zh) 2014-10-22
BR112014015273A2 (pt) 2017-06-13
JP2015504207A (ja) 2015-02-05
FR2985063B1 (fr) 2014-07-04
RU2014125072A (ru) 2016-02-10
RU2611241C2 (ru) 2017-02-21
EP2795551A1 (fr) 2014-10-29
JP6193879B2 (ja) 2017-09-06
KR20140103153A (ko) 2014-08-25
BR112014015273A8 (pt) 2017-06-13
US20150020160A1 (en) 2015-01-15
FR2985063A1 (fr) 2013-06-28

Similar Documents

Publication Publication Date Title
US9722971B2 (en) Method for routing within a mobile terminal emulating a contactless payment card
EP3116161B1 (fr) Procédé de gestion d&#39;unité de sécurité et terminal
CN109844789B (zh) 一种终端交易方法及终端
US9894469B2 (en) NFC device with multiple secure elements
US20120291095A1 (en) Independent secure element management
EP3389287A1 (fr) Procédé de communication en champ proche et terminal mobile
EP2775739B1 (fr) Routage et communications en champ proche
US10708744B2 (en) NFC-based communication method and apparatus
US20150112860A1 (en) Contactless Payment Method, Device, and System
US20140041036A1 (en) Assessing the resistance of a security module against attacks by communication pipe diversion
CN107251069B (zh) 一种近场通信支付方法及终端
Roland Applying recent secure element relay attack scenarios to the real world: Google Wallet Relay Attack
EP3155554A1 (fr) Dispositif électronique, système et procédé pour une communication en champ proche (nfc)
US9867045B2 (en) Method of managing communication between a secure element and a host device
US20130174266A1 (en) Data exchange between a secure element and a terminal
EP3610434A1 (fr) Communication par courtage initiée par nfc
US11394430B2 (en) Transaction management in an NFC device
US8978050B2 (en) Program calling method, and mobile device
US20100159905A1 (en) Method of selecting an application installed on a secured module, an associated terminal and an associated security module
WO2016151056A1 (fr) Authentification pour des transactions mobiles
US10346630B2 (en) Method of managing several profiles in a secure element
EP4134858A1 (fr) Gestion de multiples applications sur des éléments sécurisés
CN111742316B (zh) 管理包括若干个软件容器的防篡改设备的方法
CN114765778A (zh) 一种用户识别模块卡、信息处理方法及终端
WO2020052753A1 (fr) Système intermédiaire destiné à faciliter la communication entre des cartes à puce intelligentes virtuelles et une interface de carte à puce intelligente

Legal Events

Date Code Title Description
AS Assignment

Owner name: MORPHO, FRANCE

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:GONCALVES, LOUIS-PHILIPPE;POLY, SEBASTIEN;SIGNING DATES FROM 20140730 TO 20140828;REEL/FRAME:033892/0026

STCF Information on status: patent grant

Free format text: PATENTED CASE

AS Assignment

Owner name: IDEMIA IDENTITY & SECURITY FRANCE, FRANCE

Free format text: CHANGE OF NAME;ASSIGNOR:MORPHO;REEL/FRAME:055315/0087

Effective date: 20171002

FEPP Fee payment procedure

Free format text: MAINTENANCE FEE REMINDER MAILED (ORIGINAL EVENT CODE: REM.); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY

LAPS Lapse for failure to pay maintenance fees

Free format text: PATENT EXPIRED FOR FAILURE TO PAY MAINTENANCE FEES (ORIGINAL EVENT CODE: EXP.); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY

STCH Information on status: patent discontinuation

Free format text: PATENT EXPIRED DUE TO NONPAYMENT OF MAINTENANCE FEES UNDER 37 CFR 1.362

FP Lapsed due to failure to pay maintenance fee

Effective date: 20210801